A computing system includes a server. The server is communicatively coupled to a data repository and is configured to store a data in the data repository. The server is further configured to create, via a visual information flow creation tool, at least one information flow object, wherein the at least one information flow object comprises a flow, a sub-flow, an Action, or a combination thereof. The server is also configured to interface with the at least one information flow object via a front-end application programming interface (API), a back-end API, or a combination thereof. The server is additionally configured to execute the at least one information flow object via the front-end API, the back-end API, or a combination thereof, and to retrieve results obtained by executing the at least one information flow object via the front-end API, the back-end API, or the combination thereof.
|
11. A method, comprising:
creating, via a visual information flow creation tool, a first information flow object and a second information flow object, wherein the first and the second information flow objects comprise a flow, a sub-flow, an Action, or a combination thereof;
interfacing with the first information flow object via a front-end application programing interface (API) and interfacing with the second information flow object via a back-end API, wherein the front-end API includes a first set of functions for asynchronous calling for an execution of the first information flow object and retrieving outputs of the execution of the first information flow object, and wherein the back-end API includes a second set of functions for asynchronous calling for an execution of the second information flow object and retrieving outputs of the execution of the second information flow object;
providing for asynchronous execution of the first information flow object and the second information flow object included in a same software program, wherein the first flow information object is executed entirely in a client computing device via the front-end API and the second information flow object is executed entirely in a remote server via the back-end API, and wherein the first information flow object interfaces with the second information flow object via the asynchronous execution by:
executing the first set of functions to obtain the outputs of calling the execution of the first information flow object via a unique identifier of the first information flow object;
executing the second set of functions to obtain the outputs of calling the execution of the second information flow object via a unique identifier of the second information flow object; and
retrieving the outputs of the execution of the first and second sets of functions as results of the asynchronous execution.
16. A non-transitory, computer-readable medium storing instructions executable by a processor of a computing system, the instructions configured to:
create, via a visual information flow creation tool, a first information flow object and a second information flow object, wherein the first and the second information flow objects comprise a flow, a sub-flow, an Action, or a combination thereof;
interface with the first information flow object via a front-end application programing interface (API) and interface with the second information flow object via a back-end API, wherein the front-end API includes a first set of functions for asynchronous calling for an execution of the first information flow object and retrieving outputs of the execution of the first information flow object, and wherein the back-end API includes a second set of functions for asynchronous calling for an execution of the second information flow object and retrieving outputs of the execution of the second information flow object;
provide for asynchronous execution of the first information flow object and the second information flow object included in a software program, wherein the first flow information object is executed entirely in a client computing device via the front-end API and the second information flow object is executed entirely in a remote server via han the back-end API, and wherein the first information flow object interfaces with the second information flow object via the asynchronous execution by:
executing the first set of functions to obtain the outputs of calling the execution of the first information flow object via a unique identifier of the first information flow object;
executing the second set of functions to obtain the outputs of calling the execution of the second information flow obiect via a unique identifier of the second information flow object; and
retrieving the outputs of the execution of the first and second sets of functions as results of the asynchronous execution.
1. A computing system, comprising:
a server having a processor communicatively coupled to a data repository and configured to store a data in the data repository, wherein the server is configured to perform operations comprising:
creating, via a visual information flow creation tool, a first information flow object and a second information flow object, wherein the first and the second information flow objects comprise a flow, a sub-flow, an Action, or a combination thereof;
interfacing with the first information flow object via a front-end application programing interface (API) and interfacing with the second information flow object via a back-end API, wherein the front-end API includes a first set of functions for asynchronous calling for an execution of the first information flow object and retrieving outputs of the execution of the first information flow object, and wherein the back-end API includes a second set of functions for asynchronous calling for an execution of the second information flow object and retrieving outputs of the execution of the second information flow object;
providing for asynchronous execution of the first information flow object and the second information flow object included in a same software program, wherein the first flow information object is executed entirely in a client computing device via the front-end API and the second information flow object is executed entirely in a remote server via the back-end API, and wherein the first information flow object interfaces with the second information flow object via the asynchronous execution by:
executing the first set of functions to obtain the outputs of calling the execution of the first information flow object via a unique identifier of the first information flow object;
executing the second set of functions to obtain the outputs of calling the execution of the second information flow object via a unique identifier of the second information flow object; and
retrieving the outputs of the execution of the first and second sets of functions as results of the asynchronous execution.
2. The computing system of
3. The computing system of
4. The computing system of
5. The computing system of
6. The computing system of
7. The computing system of
8. The computing system of
9. The computing system of
10. The computing system of
12. The method of
13. The method of
14. The method of
15. The method of
17. The computer-readable medium of
18. The computer-readable medium of
19. The computer-readable medium of
20. The computer-readable medium of
|
The present disclosure relates generally to workflows and, more particularly, to custom workflow Application Programming Interfaces (APIs).
This section is intended to introduce the reader to various aspects of art that may be related to various aspects of the present disclosure, which are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
Cloud computing relates to the sharing of computing resources that are generally accessed via the Internet. In particular, a cloud computing infrastructure allows users, such as individuals and/or enterprises, to access a shared pool of computing resources, such as servers, storage devices, networks, applications, and/or other computing based services. By doing so, users are able to access computing resources on demand that are located at remote locations, which resources may be used to perform a variety computing functions (e.g., storing and/or processing large quantities of computing data). For enterprise and other organization users, cloud computing provides flexibility in accessing cloud computing resources without accruing large up-front costs, such as purchasing expensive network equipment or investing large amounts of time in establishing a private network infrastructure. Instead, by utilizing cloud computing resources, users are able redirect their resources to focus on their enterprise's core functions.
Within the context of cloud computing solutions for data repositories, users may be asked to deal with ever increasing amounts of data, e.g., including certain date-based information stored in the data repositories. In fact, the amount of cloud-based and date-based data collected and stored in today's cloud computing solutions, such as cloud-based repositories, may be orders of magnitude greater than what was historically collected and stored. Users tasked with automating and/or troubleshooting enterprise, IT, and/or other organization-related functions (e.g., incident tracking and/or help desk-related functions) navigate ever increasing amounts of date-based data to properly and efficiently perform their job functions. In certain embodiments, cloned data repositories may be created. With this in mind, the following embodiments are directed to improving the manner in which information workflows in certain data repositories may be automated, including cloned data repository information workflows.
A summary of certain embodiments disclosed herein is set forth below. It should be understood that these aspects are presented merely to provide the reader with a brief summary of these certain embodiments and that these aspects are not intended to limit the scope of this disclosure. Indeed, this disclosure may encompass a variety of aspects that may not be set forth below.
Information Technology (IT) networks may include a number of computing devices, server systems, databases, and the like that generate, collect, and store information. As increasing amounts of data representing vast resources become available, it becomes increasingly difficult to analyze the data, interact with the data, and/or provide reports for the data. The current embodiments enable systems and methods that may create information flows (e.g., workflows) executable in one or more instances or clones by using certain application programming interfaces (APIs). The creation of information flows may be performed by users that are not programmers or information technology personnel. For example, in certain embodiments, software tools may be used that visually present a flow of information, e.g. a flow chart view, and that enable a user to graphically manipulate the “flow” to perform desired processing, as further described below. That is, rather than entering computer code by typing text, for example, the software tools may enable the user to “draw” a flow chart which may then be executed. Accordingly, written computer code, such as Java, JavaScript, and so on, may be avoided and visual flows used instead.
The flows may include “sub-flows”, “Actions”, and “Steps”, as further described below. The techniques described herein may provide for both server side as well as front-end “Flow APIs” that are suitable for executing the flows, sub-flows, Actions, and/or Steps. In some embodiments, the Flow APIs may enable asynchronous execution. That is, the flows, sub-flows, Actions, and/or Steps may execute in an asynchronous or non-blocking manner, thus other work may be performed, resulting in improvements in efficiency and in the utilization of resources. The Flow APIs may also provide for enhanced security, for example, by using access control lists (ACLs) to verify permissions. By providing for more efficient and secure reuse of flows, sub-flows, Actions, and Steps, the Flow APIs may thus enable improved data processing and use across a larger organizational spectrum.
Various aspects of this disclosure may be better understood upon reading the following detailed description and upon reference to the drawings in which:
One or more specific embodiments will be described below. In an effort to provide a concise description of these embodiments, not all features of an actual implementation are described in the specification. It should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and enterprise-related constraints, which may vary from one implementation to another. Moreover, it should be appreciated that such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure.
One or more specific embodiments will be described below. In an effort to provide a concise description of these embodiments, not all features of an actual implementation are described in the specification. It should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and enterprise-related constraints, which may vary from one implementation to another. Moreover, it should be appreciated that such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure.
As used herein, the term “computing system” refers to an electronic computing device that includes, but is not limited to a computer, virtual machine, virtual container, host, server, laptop, and/or mobile device, or to a plurality of electronic computing devices working together to perform the function described as being performed on or by the computing system. As used herein, the term “medium” refers to one or more non-transitory, computer-readable physical media that together store the contents described as being stored thereon. Embodiments may include non-volatile secondary storage, read-only memory (ROM), and/or random-access memory (RAM). As used herein, the term “application” refers to one or more computing modules, programs, processes, workloads, threads and/or a set of computing instructions executed by a computing system. Example embodiments of an application include software modules, software objects, software instances and/or other types of executable code.
As used herein, the term “flow” may refer to data processing of information (e.g., database records) that may be presented to a user in a flow chart-like view. A flow may have inputs but may not have an output. A flow may include one or more “sub-flows” and/or one or more “Actions.” The flow may also include “triggers” and control logic. A “sub-flow” as used herein may refer to data processing of information (e.g., database records) also presented to the user in a flow chart-like view. Unlike the flow, a sub-flow may have both inputs and outputs. A sub-flow may additionally contain Actions, triggers, control logic and/or other sub-flows. A
“trigger” may be “fired” or turned on by a changes in certain conditions, such as a change in one or more database records. The trigger may also be “fired” or otherwise turned on via a schedule, e.g., daily, weekly, monthly schedule. “Action” as used herein may include one or more “Steps.” Steps may be self-contained code, such as scripts (e.g., Java, JavaScript code) provided by the manufacturer of the software tools used to create the flows, sub-flows, and the like. Steps may also be provided by users and any other entity. As used herein, the terms “flow objects” may refer to flows, sub-flows, Actions, and Steps.
Present embodiments are directed to enabling the reuse of flow objects via APIs. The APIs that may call and work with the flow objects may be referred to herein as with the term “Flow” APIs. The Flow APIs may include a back-end (e.g., server-side) API and a front-end (e.g., client-side API). The server-side API may include scriptable object(s) which may act as an API interface for all server-side code, e.g., server-side scripting code. The front-end API may enable front-end computing systems, such as web browsers, to use an implementation, such as a REST (Representational State Transfer) implementation of the Flow APIs, thus providing a more easy to use client for end-user access through a REST service. As referred to herein, “REST” may include a web-based Remote Process Call (RPC) system based on the work (e.g., Ph.D. thesis) of Roy Fielding. It is to be noted that in other embodiments any RPC system may be used, including Simple Object Access Protocol (SOAP)-based systems, JavaScript Object Notation (JSON)-based systems, XML-based systems, and so on. The Flow APIs may also provide for asynchronous execution of flow objects, for example, via push style delivery of outputs as further described below.
With the preceding in mind, the following figures relate to various types of generalized system architectures or configurations that may be employed to provide services to an organization accessing a cloud-platform, such as may be embodied in a multi-instance or multi-tenant framework on which the present approaches may be employed. Correspondingly, these system and platform examples may also relate to systems and platforms on which the techniques discussed herein may be implemented or otherwise utilized. Turning now to
For the illustrated embodiment,
In
The virtual servers 26 may store or access a variety of data, including data that may have date-based information. For example, manufacturing data, financial data, farming data, company operations data, accounting data, and so on, may be include date-based information specifying one or more points in time associated with the data. Indeed, dates of manufacture, dates of sale, dates of incidents, expiration dates, scheduled dates, and so on, may be stored in the virtual servers 26. The virtual servers 26 may then use the techniques described herein to provide for one or more calendars for data having-based information, including custom calendars.
To utilize computing resources within the platform 16, network operators may choose to configure the data centers 18 using a variety of computing infrastructures. In one embodiment, one or more of the data centers 18 are configured using a multi-instance cloud architecture to provide every customer its own unique customer instance or instances. For example, a multi-instance cloud architecture could provide each customer instance with its own dedicated application server and dedicated database server. In other examples, the multi-instance cloud architecture could deploy a single physical or virtual server 26 and/or other combinations of physical and/or virtual servers 26, such as one or more dedicated web servers, one or more dedicated application servers, and one or more database servers, for each customer instance. In a multi-instance cloud architecture, multiple customer instances could be installed on one or more respective hardware servers, where each customer instance is allocated certain portions of the physical server resources, such as computing memory, storage, and processing power. By doing so, each customer instance has its own unique software stack that provides the benefit of data isolation, relatively less downtime for customers to access the platform 16, and customer-driven upgrade schedules. An example of implementing a customer instance within a multi-instance cloud architecture will be discussed in more detail below with reference to
In the depicted example, to facilitate availability of the client instance 102, the virtual servers 26A, 26B, 26C, 26D and virtual database servers 104A, 104B are allocated to two different data centers 18A, 18B, where one of the data centers 18 acts as a backup data center 18. In reference to
As shown in
In the depicted embodiment, a database server, such as the servers 104A and/or 104B, may each include a flow data processing system 106. That is, the flow data processing system 106 may enable the creation of flow objects and then provide access (e.g. execution, status checks, and retrieval of outputs) of the flow objects via a front-end Flow API 108 and a back-end Flow API 110. The techniques described herein may allow the creation of custom flow objects and then the subsequent execution, status check, and receipt of output from the flow objects via the front-end Flow API 108 and the back-end Flow API 110. The front-end Flow API 108 may be provided for use by front-end clients, such as web browsers, mobile apps (e.g., smart phone apps), and the like. The back-end Flow API 110 may be provided for use by back-end clients that may be under the supervision, for example, of an information technology (IT) group. By providing for the front-end Flow API 108 and the back-end Flow API 110, the techniques described herein may enable a more efficient and useful reuse of flow objects, as further described herein.
Although
As may be appreciated, the respective architectures and frameworks discussed with respect to
With this in mind, and by way of background, it may be appreciated that the present approach may be implemented using one or more processor-based systems such as shown in
With this in mind, an example computer system may include some or all of the computer components depicted in
The one or more processors 202 may include one or more microprocessors capable of performing instructions stored in the memory 206. Additionally or alternatively, the one or more processors 202 may include application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), and/or other devices designed to perform some or all of the functions discussed herein without calling instructions from the memory 206.
With respect to other components, the one or more busses 204 includes suitable electrical channels to provide data and/or power between the various components of the computing system 200. The memory 206 may include any tangible, non-transitory, and computer-readable storage media. Although shown as a single block in
Turning now to
The flow 301 may include a trigger 304 which may be “fired” or otherwise turned on by certain changed condition, such as a change in one or more records stored in a database (e.g., stored in the virtual DB servers 104). The trigger 304 may additionally be “fired” periodically, for example, as part of a schedule (e.g., hourly schedule, daily schedule, weekly schedule, monthly schedule, and so on). The trigger 304 may thus be used to initiate execution of other flow objects 300, such as sub-flow 306, Action 308, Action 310, and sub-flow 312.
In the depicted embodiment, the trigger 304 initiates execution of the sub-flow 306. The sub-flow 306 may include Actions, control logic (e.g., Boolean logic, branching logic, termination logic), other sub-flows, and so on. The sub-flow 306 may additionally take in inputs and provide outputs. For example, output of the sub-flow 306 may be used as input to the Action 308. The Action 308 may use the inputs provided to execute Steps 314, 316. The Action 308 may also include control logic. As mentioned earlier, Steps, such as the Steps 314, 316, and may be self-contained code, such as scripts (e.g., Java, JavaScript code) provided by the manufacturer of the flow designer system 302. As an example, the flow designer system 302 may be provided by ServiceNow™ Inc., of Santa Clara, Calif., U.S.A., under the name Flow Designer™. The Steps 314, 316 may be additionally or alternatively provided by other third parties and/or coded by certain users, such as IT users.
Steps may include any number of functionality, such as requesting approval from other users of the servers 26, 104, creating records in a database table, editing the record in the database table, deleting the records in the database table, creating server tasks, logging messages, looking up database information, notifying of certain events (e.g., incidents, change requests, problems, changes to user records), executing scripts, such as JavaScript, sending REST web service requests, sending email, waiting for a condition to occur, and so on. Action 310 may execute following Action 308. In turn, Action 310 may include Steps 318, 320, and upon completion of Step 320, sub-flow 312 may be executed. Once sub-flow 312 finishes execution, the flow 301 finishes. As noted earlier, the flows, such as the flow 301, may not have outputs.
The flows may be executable from external clients, such as a front-end client 322 (e.g., executable via device 20) and a back-end client 324 (e.g., executable via servers 26 and/or 104). More specifically, the front-end client 322 may interface with the flow objects 300 via the front-end Flow API 108 and the back-end client may interface with the flow objects 300 via the back-end Flow API 110. Each API 108, 110 may include three or more function types as follows:
Function 1) Call Action/Sub-flow/Flow (Inputs: Object ID, Array of input Arguments)—Output: ExecutionID. This API function type executes a desired Action, sub-flow, or flow, and uses a list of inputs, including the flow object's identification (ID), and an array of input arguments. The array of input arguments may include numeric values, text, characters, Unicode, and so on. Once executed, the Call Action/Sub-flow/Flow API may result in an asynchronous execution of the given Action, sub-flow, or flow. In certain embodiments, the response of the asynchronous execution may be provided by an asynchronous message bus (AMB) system 326. For example, the AMB system 326 may be in charge of managing the delivery of the response of the asynchronous execution of the flow objects 300 and interacting with the APIs 108, 110 based on the asynchronous execution. Outputs for the Call Action/Sub-flow/Flow may include a “handle” or unique identifier (e.g., ExecutionID) uniquely identifying the executing Action, sub-flow, and/or flow. As used herein, Function 1 types may include Call Action ( . . . ), Call Sub-flow ( . . . ), and Call Flow ( . . . ).
Function 2) Check Action/Sub-flow/Flow Execution Status (Inputs: ExecutionID)—Output: Execution status. This API function type may be provided to derive the current status of the executing Action, sub-flow, and/or flow. For example, given an input such as the previously received ExecutionID (e.g., received via the Call Action/Sub-flow/Flow API described above), the Check Action/Sub-flow/Flow API may then return an execution status, such as “executing”, “execution completed”, and so on. As used herein, Function 2 types may include Check Action ( . . . ), Check Sub-flow ( . . . ), and Check Flow ( . . . ).
Function 3) Retrieve Action/Sub-flow/Flow Outputs (Inputs: ExecutionID)—Output: Array of output Arguments. This API function may be used to retrieve outputs of the previously executed Call API. That is, once the Call API is completed, the Retrieve API may then be called, using the ExecutionID previously described, to retrieve any outputs of the Call API. As used herein, Function 3 types may include Retrieve Action ( . . . ), Retrieve Sub-flow ( . . . ), and Retrieve Flow ( . . . ).
As previously noted, each of the three API function types listed above may be provided for the front-end API 108 and/or for the back-end API 110. However, some changes may be made. For example, in certain embodiments, the front-end API 108 may be using a REST implementation, as further described below in
In the depicted embodiment, the graphical flow view 402 may start execution via a trigger 404. More specifically, if a certain user record is updated, then the trigger 404 may “fire” and execute Action 406. The Action 406 may then retrieve a set of tasks assigned to the updated user that have an open state. The retrieved tasks may then be further process via a “Do . . . Until” control logic. More specifically, a Do logic 408 may execute one or more Actions, such as Action 410, until the “Until” control logic 410 has its conditions met. More sub-flows and/or Actions may be added, for example, via the “+” control 414. As shown, natural language and visual composition via the flow designer 302 may be used to enable the creation of executable flow objects 300. The flow objects 300 may then be reused by the front-end client 322 and/or the back-end client 324.
Turning now to
The processing engine 464 may process the dispatch 462 to execute the chosen flow object(s) 300, such as by executing an Action. The processing engine 464 may execute the Action asynchronously, e.g., in a background thread. When the Action's processing is complete 466, the AMB 326 may notify the client-side code 452 via a callback 468. More specifically, a callback function included in the client-side code 452 may be executed by the AMB 326 once the processing completes 466. The client-side code 452 may then execute, for example, the Retrieve Flow API (e.g., Function 3 above) to get results from execution of the flow object(s) 300. It is to be noted that the client-side code 452 and the script client API 454 may be implemented in a number of computer languages in addition to or alternative to JavaScript. It is also to be understood that while the depicted figure shows Actions as the executable flow object 300, other embodiments may use other flow objects 300, such as flows and/or sub-flows.
The processing engine 464 may process the dispatch 508 to execute the chosen flow object(s) 300, such as by executing an Action and then returning 510 an ExecutionID representative of a “handle” or “pointer” to the Action being executed. The processing engine 464 may execute the Action asynchronously, such as via a background thread. In the depicted embodiment, the server-side code 502 may then execute 512 the Check Action Execution Status API (e.g., Function 2) included in the back-end Flow API 110, for example, by using the returned 510 ExecutionID as input to the Check Action Execution Status API. That is, the server-side code 502 may check the status of execution to see if the Action has completed execution. A returned 514 status may inform the server-side code 502 that the Action has not completed execution.
Accordingly, the server-side code 502 may wait and then again execute 516 the Check Action Execution Status API (e.g., Function 2) included in the back-end Flow API 110, for example, by using the returned 510 ExecutionID. A returned 516 status may now inform the server-side code 502 that the Action has completed execution. To receive the outputs of the Action's execution, the server-side code may then execute 520 the Retrieve Action Outputs API (e.g., Function 3) included in the back-end Flow API 110, for example, by using the returned 510 ExecutionID. The Retrieve Action Outputs API may then return 522 an array of output arguments derived by executing the Action. In certain embodiments, the server-side code 502 and/or the scriptable object 504 may be implemented for execution via Rhino, a JavaScript engine written fully in Java and managed by the Mozilla Foundation. In other embodiments, the server-side code 502 and/or the scriptable object 504 may be implemented in Java, Python, C, C++, and so on, executable by a variety of back-end engines.
The process 600 may then provide an interface (block 604) for the flow objects 300. In the depicted example, two interfaces are provided. A first interface may include the front-end Flow APIs 108, and a second interface may include the back-end Flow APIs 110. As mentioned above, the front-end Flow APIs 108 may interface with the flow objects 300 to execute the objects 300, check the status of execution of the objects 300, and to retrieve results (block 606) to the front-end client 322. Likewise, the back-end Flow APIs 110 may interface with the flow objects 300 to execute the objects 300, check the status of execution of the objects 300, and to retrieve results (block 608) to the back-end client 324.
The processing engine 464 may then return 808 results from the execution 806 of the call. Likewise, the server-side code 802 may also wait for results from the scriptable object 804. Accordingly, the scriptable object 804 may return 810 results to the server-side code 802 that was waiting. Accordingly, both asynchronous and synchronous processing may be provide, with the synchronous example shown in
The techniques presented and claimed herein are referenced and applied to material objects and concrete examples of a practical nature that demonstrably improve the present technical field and, as such, are not abstract, intangible or purely theoretical. Further, if any claims appended to the end of this specification contain one or more elements designated as “means for [perform]ing [a function] . . . ” or “step for [perform]ing [a function] . . . ”, it is intended that such elements are to be interpreted under 35 U.S.C. 112(f). However, for any claims containing elements designated in any other manner, it is intended that such elements are not to be interpreted under 35 U.S.C. 112(f).
Nelson, Harry Thomas, Stoddart, Matthew Breckenridge, Swope, Stuart Dean, Tamjidi, David, Koya, Venkata Kiran Kumar, Nerius, Joshua Timothy, Dias, Rebecca Anita
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10002203, | Aug 31 2001 | BMC Software, Inc. | Service desk data transfer interface |
6321229, | Feb 26 1999 | HEWLETT PACKARD ENTERPRISE COMPANY | Method and apparatus for using an information model to organize an information repository into a hierarchy of information |
6609122, | Aug 01 2000 | BMC Software, Inc.; BMC SOFTWARE, INC ; MBC SOFTWARE | Navigation of view relationships in database system |
6678887, | Jul 11 2000 | BMC SOFTWARE, INC | Customizing business logic and data sources by modifying methods defined within an API |
6799189, | Nov 15 2001 | BMC Software, Inc. | System and method for creating a series of online snapshots for recovery purposes |
6816898, | Aug 16 2000 | BMC SOFTWARE, INC | Interfacing external metrics into a performance management system |
6895586, | Aug 30 2000 | BMC Software | Enterprise management system and method which includes a common enterprise-wide namespace and prototype-based hierarchical inheritance |
7020706, | Jun 17 2002 | BMC SOFTWARE, INC | Method and system for automatically updating multiple servers |
7027411, | Oct 31 2000 | Hewlett Packard Enterprise Development LP | Method and system for identifying and processing changes to a network topology |
7028301, | Dec 08 2000 | BMC SOFTWARE, INC ; BMC Software | System and method for automatic workload characterization |
7062683, | Apr 22 2003 | BMC Software, Inc.; SIDELINGER, MR KEN | Two-phase root cause analysis |
7131037, | Jun 05 2002 | BMC SOFTWARE, INC | Method and system to correlate a specific alarm to one or more events to identify a possible cause of the alarm |
7170864, | Mar 08 2001 | BMC SOFTWARE, INC | System and method for WAP server management using a single console |
7350209, | Jun 29 2001 | BMC Software | System and method for application performance management |
7392300, | Jan 08 2004 | Hewlett Packard Enterprise Development LP | Method and system for modelling a communications network |
7454659, | Aug 24 2004 | MATHWORKS, INC , THE | Distributed systems in test environments |
7610512, | Jan 06 2006 | THE CONUNDRUM IP LLC | System and method for automated and assisted resolution of it incidents |
7617073, | Mar 01 2002 | BMC SOFTWARE, INC | System and method for assessing and indicating the health of components |
7685167, | Jan 30 2007 | BMC Software, Inc. | Configuration management database reference instance |
7689628, | May 19 2005 | BMC SOFTWARE, INC | Monitoring several distributed resource elements as a resource pool |
7716353, | Dec 21 2005 | BMC Software, Inc.; BMC SOFTWARE, INC | Web services availability cache |
7769718, | Nov 26 2003 | BMC Software, Inc. | Unobtrusive point-in-time consistent copies |
7890802, | Jan 06 2006 | THE CONUNDRUM IP LLC | System and method for automated and assisted resolution of IT incidents |
7925981, | May 14 2003 | MICRO FOCUS LLC | Systems and methods for managing web services via a framework of interfaces |
7930396, | Jul 10 2000 | BMC Software, Inc. | System and method of enterprise systems and business impact management |
7933927, | Nov 17 2004 | BMC Software, Inc.; BMC SOFTWARE, INC | Method and apparatus for building index of source data |
7945860, | May 14 2003 | MICRO FOCUS LLC | Systems and methods for managing conversations between information technology resources |
7966398, | Mar 30 2001 | BMC Software, Inc. | Synthetic transaction monitor with replay capability |
8051164, | Dec 14 2007 | BMC Software, Inc. | Impact propagation in a directed acyclic graph having restricted views |
8082222, | Jan 14 2009 | BMC Software, Inc.; BMC SOFTWARE, INC | CMDB federation method and management system |
8151261, | Oct 10 2002 | BMC Software, Inc. | System and method for packaging updates |
8224683, | Jul 08 2003 | Hewlett Packard Enterprise Development LP | Information technology service request level of service monitor |
8266096, | Oct 24 2008 | BMC HELIX, INC | Vendor portfolio management in support of vendor relationship management analysis, planning and evaluation |
8380645, | May 27 2010 | BMC Software, Inc.; BMC SOFTWARE, INC | Method and system to enable inferencing for natural language queries of configuration management databases |
8402127, | Jun 28 2010 | BMC Software, Inc.; BMC SOFTWARE, INC | System and method for offering virtual private clouds within a public cloud environment |
8457928, | Mar 26 2010 | BMC SOFTWARE, INC | Automatic determination of dynamic threshold for accurate detection of abnormalities |
8478569, | Mar 26 2010 | BMC Software, Inc.; BMC SOFTWARE, INC | Auto adjustment of baseline on configuration change |
8554750, | Jan 15 2009 | BMC Software, Inc. | Normalization engine to manage configuration management database integrity |
8612408, | Dec 21 2004 | BMC SOFTWARE, INC | System and method for business service management |
8646093, | Mar 31 2009 | BMC Software, Inc. | Method and system for configuration management database software license compliance |
8674992, | Jun 24 2010 | BMC Software, Inc. | Spotlight graphs |
8689241, | Sep 30 2011 | BMC SOFTWARE, INC | Dynamic evocations for computer event management |
8743121, | Dec 23 2009 | BMC Software, Inc.; BMC SOFTWARE, INC | Smart impact views |
8745040, | Jun 27 2011 | BMC SOFTWARE, INC | Service context |
8812539, | Mar 31 2012 | BMC Software, Inc.; BMC SOFTWARE, INC | Unique attribute constraints for versioned database objects |
8832652, | Mar 26 2010 | BMC Software, Inc. | Method for customizing software applications |
8887133, | Apr 28 2006 | BMC SOFTWARE, INC | Bi-directional communication between change management tool and implementation tools |
9015188, | Sep 28 2011 | BMC Software, Inc. | Methods and apparatus for monitoring execution of a database query program |
9037536, | Nov 22 2000 | BMC Software, Inc. | Database management system and method which monitors activity levels and determines appropriate schedule times |
9065783, | Aug 31 2006 | BMC Software, Inc. | Automated capacity provisioning method using historical performance data |
9098322, | Mar 15 2013 | BMC SOFTWARE, INC | Managing a server template |
9122552, | Jun 29 2012 | BMC HELIX, INC | Hybrid cloud infrastructures |
9137115, | Dec 06 2004 | BMC Software, Inc. | System and method for resource reconciliation in an enterprise management system |
9239857, | Dec 21 2004 | BMC Software, Inc. | System and method for building business service model |
9317327, | Feb 28 2013 | CAPLAN SOFTWARE DEVELOPMENT S R L ; BMC SOFTWARE, INC | Computing infrastructure planning |
9323801, | Mar 26 2010 | BMC Software, Inc. | Statistical identification of instances during reconciliation process |
9363252, | Mar 26 2010 | BMC Software, Inc. | Method for customizing software applications |
9412084, | Jun 27 2011 | BMC Software, Inc. | Service context |
9467344, | Mar 26 2010 | BMC Software, Inc.; BMC SOFTWARE, INC | Mechanism to display graphical IT infrastructure using configurable smart navigation |
9535737, | Jan 30 2015 | BMC HELIX, INC | Dynamic virtual port provisioning |
9557969, | Mar 28 2012 | BMC Software, Inc. | Automated blueprint assembly for assembling an application |
9613969, | May 27 2015 | United Microelectronics Corp. | Semiconductor structure and method of forming the same |
9645833, | Dec 31 2012 | BMC Software, Inc.; BMC SOFTWARE, INC | Additive independent object modification |
9654473, | Jun 28 2013 | BMC Software, Inc.; BMC SOFTWARE, INC | Authentication proxy agent |
9659051, | Dec 22 2014 | BMC HELIX, INC | Enforcing referential integrity for object data documents |
9766935, | Dec 30 2009 | BMC Software, Inc. | Automating application provisioning for heterogeneous datacenter environments |
9792387, | Aug 31 2001 | BMC Software, Inc. | Service desk data transfer interface |
9805322, | Jun 24 2010 | BMC SOFTWARE, INC | Application blueprint and deployment model for dynamic business service management (BSM) |
9852165, | Mar 14 2013 | BMC Software, Inc. | Storing and retrieving context senstive data in a management system |
20050160397, | |||
20080263516, | |||
20100141980, | |||
20150170088, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 17 2018 | ServiceNow, Inc. | (assignment on the face of the patent) | / | |||
Sep 17 2018 | NELSON, HARRY THOMAS | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050922 | /0953 | |
Sep 17 2018 | STODDART, MATTHEW BRECKENRIDGE | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050922 | /0953 | |
Sep 17 2018 | SWOPE, STUART DEAN | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050922 | /0953 | |
Sep 17 2018 | NERIUS, JOSHUA TIMOTHY | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050922 | /0953 | |
Sep 17 2018 | TAMJIDI, DAVID | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050922 | /0953 | |
Sep 25 2018 | KOYA, VENKATA KIRAN KUMAR | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050922 | /0953 | |
Sep 26 2018 | DIAS, REBECCA ANITA | ServiceNow, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 050922 | /0953 |
Date | Maintenance Fee Events |
Sep 17 2018 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Sep 24 2024 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Apr 06 2024 | 4 years fee payment window open |
Oct 06 2024 | 6 months grace period start (w surcharge) |
Apr 06 2025 | patent expiry (for year 4) |
Apr 06 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 06 2028 | 8 years fee payment window open |
Oct 06 2028 | 6 months grace period start (w surcharge) |
Apr 06 2029 | patent expiry (for year 8) |
Apr 06 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 06 2032 | 12 years fee payment window open |
Oct 06 2032 | 6 months grace period start (w surcharge) |
Apr 06 2033 | patent expiry (for year 12) |
Apr 06 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |